Hacker News new | past | comments | ask | show | jobs | submit login

Did you read it? There are multiple examples of claimed exploitation right below the section I linked.



Which bit says about stealing a certificate/keys and MITMing traffic with the stolen keys - with real world ramifications?




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: